أحمد
2010-May-07 16:02 UTC
[Secure-testing-team] Bug#580669: texlive-bin: Fix arbitrary code execution via memory corruption
Package: texlive-bin Version: 2009-5 Severity: grave Tags: patch security Justification: user security hole User: ubuntu-devel at lists.ubuntu.com Usertags: origin-ubuntu maverick ubuntu-patch *** /tmp/tmpCGJT89 In Ubuntu, we''ve applied the attached patch to achieve the following: * SECURITY UPDATE: arbitrary code execution via memory corruption (LP: #537103) - debian/patches/security-CVE-2010-0827.patch: make sure name isn''t too long in texk/dvipsk/virtualfont.c. - CVE-2010-0827 We thought you might be interested in doing the same. -- System Information: Debian Release: 5.0.4 APT prefers oldstable APT policy: (500, ''oldstable''), (500, ''stable''), (1, ''experimental'') Architecture: amd64 (x86_64) Kernel: Linux 2.6.18-6-xen-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash -------------- next part -------------- A non-text attachment was scrubbed... Name: tmpXgfAtP Type: text/x-diff Size: 1175 bytes Desc: not available URL: <http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20100507/40273e4c/attachment.diff>